+

Search Tips   |   Advanced Search

 

Enable cryptographic keys stored in hardware devices in Web Services Security

 

You can enable individual Web service applications to use cryptographic keys stored in hardware devices in Web Services Security. You must first configure the hardware acceleration device using the key management panels in the console. See Configure hardware cryptographic devices for Web Services Security

 

Procedure

  1. In the console, click Servers > Application servers and then select the server name.

  2. Under Security, click Web services: default bindings for Web services security.

  3. Under Additional properties, click key locators.

  4. Select the key locator name.

  5. Under Key store, specify the name of the keystore configuration.

    If the keystore reference is specified to a hardware device configuration, the Web Services Security runtime first attempts to obtain the cryptographic algorithm from the hardware device. If the hardware device is not supported or if it fails, the runtime for Web services security obtains the cryptographic algorithm from the security providers list. See Creating a keystore configuration for more information about how to create the name of a keystore configuration.

    If hardware acceleration is enabled, the Web service security runtime first attempts to use the hardware device for cryptographic operations. If the attempt to use the hardware device fails or if the algorithm is not supported by the hardware device, the runtime will use a software provider from the security providers list. The runtime displays a warning message that you failed to use hardware cryptographic provider but the process will continue using the software that is provided.

  6. Click OK.

 

Results

If the name of the keystore reference is a Java keystore file, a hardware acceleration device that is configured at the appserver level (ws-security.xml) will be used for cryptographic operations.


 

Related concepts


Hardware cryptographic device support for Web Services Security

 

Related tasks


Configure hardware cryptographic devices for Web Services Security
Creating a keystore configuration
Enabling hardware cryptographic devices for Web Services Security